Internet of Vehicles (IoV)

A special issue of IoT (ISSN 2624-831X).

Deadline for manuscript submissions: closed (31 March 2026) | Viewed by 1972

Special Issue Editors


E-Mail Website
Guest Editor
Department of Telecommunications and Media Informatics, Budapest University of Technology and Economics, 1117 Budapest, Hungary
Interests: 5G; Vehicle-to-Everything; machine to machine communication (M2M); private networks; artificial intelligence
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Automotive Technologies, Budapest University of Technology and Economics, 1111 Budapest, Hungary
Interests: machine vision; sensor fusion; calibration; machine learning
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Institute of Automotive Engineering, Graz University of Technology, 8010 Graz, Austria
Interests: Advanced Driver Assistance Systems (ADAS); Vehicle-to-Everything; artificial intelligence; machine learning
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

We are delighted to announce this Special Issue on Internet of Vehicles (IoV). This Special Issue aims to explore cutting-edge advancements, theoretical innovations, and practical implementations in the rapidly evolving field of IoV research. As a key enabler of intelligent transportation systems, IoV integrates vehicles, infrastructure, and cloud computing through high-performance communication and interaction frameworks.

The purpose of this Special Issue is to provide a premier platform for academics, researchers, and practitioners to present influential articles, share experimental results, and discuss emerging trends in IoV research. With a focus on enhancing safety, efficiency, and reliability in transportation, this collection aspires to drive forward research that aligns with the needs of connected and autonomous vehicles within smart cities and beyond.

We encourage submissions of high-quality original research, reviews, and survey papers that are well-aligned with the international journal's standards and have not been published or submitted elsewhere. Submissions should address foundational and applied challenges in IoV research and provide valuable insights into advancing the state of the art.

Topics of interest include, but are not limited to, the following:

  • Mobile and wireless communication/networking for IoV;
  • Security, privacy, and reliability in IoV systems;
  • Testing and validation for transportation safety;
  • OpenGateway, Network Exposure Function, CAMARA, and APIs;
  • Machine learning and AI applications in IoV;
  • Vehicle-to-Everything (V2X), Vehicle-to-Grid (V2G), and Vehicle-to-Home (V2H) communications;
  • Intelligent applications and infrastructure for vehicles and traffic systems;
  • Autonomous driving and self-driving vehicle technologies;
  • Numerical modeling of IoV communication;
  • Edge computing and network integration in smart cities;
  • Big data governance and analytics for IoV systems;
  • 5G and beyond technologies enabling IoV, with or without PC5;
  • Emerging IoV applications and services.

We look forward to receiving your contributions to this dynamic and impactful Special Issue. Together, let us advance the frontier of IoV research and pave the way for intelligent and sustainable transportation systems.

You may choose our Joint Special Issue in Electronics.

Dr. Gabor Soos
Dr. András Rövid
Dr. Tomislav Mihalj
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. IoT is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Internet of Vehicles (IoV)
  • Vehicle-to-Everything communication
  • autonomous driving
  • smart cities
  • edge computing
  • testing and validation
  • big data analytics
  • CAMARA
  • security and privacy
  • road safety
  • 5G and beyond technologies

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 5108 KB  
Article
Privacy-Preserving Emergency Vehicle Authentication Scheme Using Zero-Knowledge Proofs and Blockchain
by Hanshi Li, Drishti Oza, Masami Yoshida and Taku Noguchi
IoT 2026, 7(2), 35; https://doi.org/10.3390/iot7020035 - 21 Apr 2026
Viewed by 342
Abstract
Emergency vehicle authentication in vehicular ad hoc networks must satisfy strict latency, privacy, and trust constraints. Existing Public Key Infrastructure- and Conditional Privacy-Preserving Authentication-based schemes incur substantial overhead from certificate management and expensive per-hop verification, making them unsuitable for real-time emergency scenarios. We [...] Read more.
Emergency vehicle authentication in vehicular ad hoc networks must satisfy strict latency, privacy, and trust constraints. Existing Public Key Infrastructure- and Conditional Privacy-Preserving Authentication-based schemes incur substantial overhead from certificate management and expensive per-hop verification, making them unsuitable for real-time emergency scenarios. We propose a lightweight zero-knowledge- and blockchain-assisted authentication scheme that eliminates certificates, pseudonym pools, and the requirement for online interaction with a trusted authority during the authentication phase. The Certificate Authority (CA) is involved only during offline initialization stages (vehicle enrollment and Merkle tree construction); once provisioning is complete, the runtime authentication process operates without any online CA interaction. Each emergency vehicle registers one-time hash commitments on-chain after proving membership in a category-specific Merkle tree, and authenticates messages by broadcasting a hash along with a zero-knowledge proof of preimage knowledge. Roadside units verify the proof and consult the on-chain state to enforce single-use semantics, creating a tamper-resistant audit trail. Evaluation using the Veins framework (OMNeT++/SUMO) demonstrated a constant 288-byte authenticated payload, millisecond-level end-to-end delay independent of hop count, and stable blockchain processing under sustained load. Full article
(This article belongs to the Special Issue Internet of Vehicles (IoV))
Show Figures

Figure 1

30 pages, 1666 KB  
Article
Cryptanalysis and Improvement of the SMEP-IoV Protocol: A Secure and Lightweight Protocol for Message Exchange in IoV Paradigm
by Gelare Oudi Ghadim, Parvin Rastegari, Mohammad Dakhilalian, Faramarz Hendessi, Shahrzad Saremi, Rania Shibl, Yassine Himeur, Shadi Atalla and Wathiq Mansoor
IoT 2026, 7(2), 31; https://doi.org/10.3390/iot7020031 - 31 Mar 2026
Viewed by 469
Abstract
The Internet of Vehicles (IoV) is a rapidly evolving technology that provides real-time connectivity, enhanced road safety, and reduced traffic congestion; however, its inherently open communication channels expose it to serious security and privacy threats. In 2021, Chaudhry proposed SMEP-IoV, a lightweight message [...] Read more.
The Internet of Vehicles (IoV) is a rapidly evolving technology that provides real-time connectivity, enhanced road safety, and reduced traffic congestion; however, its inherently open communication channels expose it to serious security and privacy threats. In 2021, Chaudhry proposed SMEP-IoV, a lightweight message authentication protocol designed to satisfy essential security requirements. This paper presents a comprehensive security analysis of SMEP-IoV and reveals several serious vulnerabilities. Specifically, sensitive credentials are stored in plaintext without tamper-resistant protection, and both authentication and session key derivation depend directly on these credentials. These structural flaws allow an adversary to extract the stored secrets, generate valid authentication messages, and derive the established session key, enabling vehicle impersonation and session key disclosure attacks. Moreover, compromise of long-term secrets facilitates key compromise impersonation attacks. It also fails to ensure anonymity and perfect forward secrecy. To address these issues, we propose an enhanced authentication protocol for resource-constrained IoV environments, leveraging a three-factor authentication mechanism combined with lightweight cryptographic primitives. Formal security analyses using BAN logic, Tamarin, and ProVerif confirm its resilience against known attacks, while NS-3 simulations validate its scalability, high throughput, and low End-to-End Delay (E2ED). The results highlight the protocol as a robust, efficient, and scalable solution for large-scale IoV deployments. Full article
(This article belongs to the Special Issue Internet of Vehicles (IoV))
Show Figures

Figure 1

Back to TopTop